General
-
Target
7b4884a6908e6b25d76f6a2c7b9ef754fcba5a078d6553d6bd6df2fc4bf7b6ff
-
Size
73KB
-
Sample
221105-a1svbacda9
-
MD5
5f1664f94cdd45d6fb4c07e7dfcf4820
-
SHA1
33f9402b8c7321a304208e693ce7421472c127de
-
SHA256
7b4884a6908e6b25d76f6a2c7b9ef754fcba5a078d6553d6bd6df2fc4bf7b6ff
-
SHA512
f737ab46365a8e0d1397f282549be80c0fd70383e970af9569e300c26f67fea03c77dd7b05a8796f2454d15831046e7e9a5a7c0209b6a572957222636388bf60
-
SSDEEP
1536:o555555555555pmgSeGDjtQhnwmmB0ypXdMqqU+2bbbAV2/S2mr3IdE8mne0AvuI:lMSjOnrmBBtMqqDL2/mr3IdE8we0Avuj
Behavioral task
behavioral1
Sample
7b4884a6908e6b25d76f6a2c7b9ef754fcba5a078d6553d6bd6df2fc4bf7b6ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b4884a6908e6b25d76f6a2c7b9ef754fcba5a078d6553d6bd6df2fc4bf7b6ff.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
gandcrab
http://gdcbghvjyqy7jclk.onion.top/
Targets
-
-
Target
7b4884a6908e6b25d76f6a2c7b9ef754fcba5a078d6553d6bd6df2fc4bf7b6ff
-
Size
73KB
-
MD5
5f1664f94cdd45d6fb4c07e7dfcf4820
-
SHA1
33f9402b8c7321a304208e693ce7421472c127de
-
SHA256
7b4884a6908e6b25d76f6a2c7b9ef754fcba5a078d6553d6bd6df2fc4bf7b6ff
-
SHA512
f737ab46365a8e0d1397f282549be80c0fd70383e970af9569e300c26f67fea03c77dd7b05a8796f2454d15831046e7e9a5a7c0209b6a572957222636388bf60
-
SSDEEP
1536:o555555555555pmgSeGDjtQhnwmmB0ypXdMqqU+2bbbAV2/S2mr3IdE8mne0AvuI:lMSjOnrmBBtMqqDL2/mr3IdE8we0Avuj
Score6/10-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-